US20120051587A1 - Mail Exchange Tracking and Analysis - Google Patents
Mail Exchange Tracking and Analysis Download PDFInfo
- Publication number
- US20120051587A1 US20120051587A1 US13/185,733 US201113185733A US2012051587A1 US 20120051587 A1 US20120051587 A1 US 20120051587A1 US 201113185733 A US201113185733 A US 201113185733A US 2012051587 A1 US2012051587 A1 US 2012051587A1
- Authority
- US
- United States
- Prior art keywords
- data
- mailpiece
- machine
- processing system
- recognized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/30—Writer recognition; Reading and verifying signatures
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B07—SEPARATING SOLIDS FROM SOLIDS; SORTING
- B07C—POSTAL SORTING; SORTING INDIVIDUAL ARTICLES, OR BULK MATERIAL FIT TO BE SORTED PIECE-MEAL, e.g. BY PICKING
- B07C3/00—Sorting according to destination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/30—Scenes; Scene-specific elements in albums, collections or shared content, e.g. social network photos or video
Definitions
- the present disclosure is directed, in general, to tracking mailpieces.
- a method includes receiving an image of a first mailpiece and associated machine-recognized data.
- the method includes comparing the machine-recognized data with a target list to determine a match with a target individual.
- the method includes performing a writer identification process on the image of the first mailpiece when a match is determined between the machine-recognized data and the target individual.
- the writer identification process produces writer identification data associated with the first mailpiece.
- the method includes storing the image of the first mailpiece and associated machine-recognized data and writer identification data.
- FIG. 1 depicts a block diagram of a data processing system in which an embodiment can be implemented
- FIG. 2 illustrates a flowchart with a broad range of postal processing for individual mail and advertised mail
- FIG. 3 is an example of a typical mailpiece exchanged between individuals
- FIG. 4 is a flowchart of various processes in accordance with disclosed embodiments.
- FIG. 5 illustrates an example of a “network” of correspondence in accordance with disclosed embodiments.
- FIGS. 1 through 5 discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with reference to exemplary non-limiting embodiments.
- the nature of electronic communication is such that monitoring and tracking of digital communication can be performed by exploiting the characteristics of the data and electronic media.
- Telephone records, wiretaps, text messaging, and electronic mail are easily tracked, via legal and extralegal means, and information gathered under these circumstances can be made available to investigators.
- individuals that seek to avoid this monitoring, including criminals and terrorists are shifting communication to traditional means, such as postal delivery.
- the advantage of postal delivery is the perceived lack of tracking between sender and recipient, the difficulty in monitoring the communication itself, and the possibility to utterly destroy evidence of the communication.
- Disclosed embodiments enable the tracking and monitoring of postal and private-carrier communications to the same degree as electronic communications.
- Various embodiments include a system by which postal messaging may be tracked, monitored, analyzed and redirected.
- Some embodiments include systems and methods for tracking the exchange of postal items between a target recipient and various senders, identifying relationship networks between senders and other sender/recipients of other deliveries, recording images of mail items under scrutiny, and potentially intercepting specific mail items prior to delivery.
- postal “mail”, “mail items”, “mailpiece”, and other similar terms are used to describe specific embodiments, these are intended to include private-courier services, letters, and packages as well as governmental (or quasi-governmental) postal services such as the United States Postal Service.
- FIG. 1 depicts a block diagram of a data processing system 100 in which an embodiment can be implemented, for example as a mail piece tracking and analysis system configured to perform processes as described herein.
- the data processing system 100 includes a processor 102 connected to a level two cache/bridge 104 , which is connected in turn to a local system bus 106 .
- the local system bus 106 may be, for example, a peripheral component interconnect (PCI) architecture bus.
- PCI peripheral component interconnect
- Also connected to the local system bus 106 in the depicted example are a main memory 108 and a graphics adapter 110 .
- the graphics adapter 110 may be connected to a display 111 .
- LAN local area network
- WiFi Wireless Fidelity
- I/O input/output
- the I/O bus 116 is connected to a keyboard/mouse adapter 118 , a disk controller 120 , and an I/O adapter 122 .
- the disk controller 120 can be connected to a storage 126 , which can be any suitable machine usable or machine readable storage medium, including but not limited to nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), magnetic tape storage, and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and other known optical, electrical, or magnetic storage devices.
- ROMs read only memories
- EEPROMs electrically programmable read only memories
- CD-ROMs compact disk read only memories
- DVDs digital versatile disks
- the I/O adapter 122 can be connected to mail handling equipment 128 , for processing mailpieces as described below.
- Mail handling equipment can include sorters, transporters, imagers, printers, and other facing, cancelling, imaging, and processing equipment known to those of skill in the art.
- an audio adapter 124 Also connected to the I/O bus 116 in the example shown is an audio adapter 124 , to which speakers (not shown) may be connected for playing sounds.
- the keyboard/mouse adapter 118 provides a connection for a pointing device (not shown), such as a mouse, trackball, trackpointer, etc.
- FIG. 1 may vary for particular implementations.
- other peripheral devices such as an optical disk drive and the like, also may be used in addition or in place of the hardware depicted.
- multiple data processing systems may be connected and configured to cooperatively perform the processing described herein.
- the depicted example is provided for the purpose of explanation only and is not meant to imply architectural limitations with respect to the present disclosure.
- a data processing system in accordance with an embodiment of the present disclosure includes an operating system employing a graphical user interface.
- the operating system permits multiple display windows to be presented in the graphical user interface simultaneously, with each display window providing an interface to a different application or to a different instance of the same application.
- a cursor in the graphical user interface may be manipulated by a user through the pointing device. The position of the cursor may be changed and/or an event, such as clicking a mouse button, generated to actuate a desired response.
- One of various commercial operating systems such as a version of Microsoft WindowsTM, a product of Microsoft Corporation located in Redmond, Wash. may be employed if suitably modified.
- the operating system is modified or created in accordance with the present disclosure as described.
- the LAN/WAN/Wireless adapter 112 can be connected to a network 130 (not a part of data processing system 100 ), which can be any public or private data processing system network or combination of networks, as known to those of skill in the art, including the Internet.
- the data processing system 100 can communicate over the network 130 with a server system 140 , which is also not part of the data processing system 100 , but can be implemented, for example, as a separate data processing system 100 .
- Postal operational systems for processing and delivering mail allow for different levels of processing depending on the sender and the quantity and manner in which the mail is prepared.
- Advertising mail which is typically many duplicate mail items, presorted according to neighborhoods and delivery stops, bypasses most processing, distribution, and even transportation steps.
- mail between individuals tends to be individual in content, and requires the broadest range of postal processing. Disclosed embodiments are particularly useful with regard to mail between individuals, which tends to represent specific communication between individuals.
- FIG. 2 illustrates a flowchart 200 with a broad range of postal processing for individual mail and advertised mil. Generally, mail between individuals requires all postal processing steps.
- An individual sender 205 places a mailpiece for collection 210 , for example in a home mail box, central mail box, or post office.
- the mailpiece is transported 215 to a processing facility, where is it separated by format 220 .
- This can include, for example, separating letters from flats or parcels.
- Postal processing systems tend to be specialized according to the size and shape of the mail item.
- the smallest mail items are flat, letter-sized items, called “letters,” which are efficiently processed in highly automated systems, with extensive automatic imaging and related automatic machine-recognition capabilities.
- the next class of mail is called “flats;” they are flat items that tend to be the size of a magazine.
- Flats processing is not quite as automated as letters, but they also undergo extensive automatic imaging and machine recognition coincident with their processing.
- parcels represent items that tend to not be “flat” in their shape, and tend to represent physical goods rather than printed information, as is the case with letters and flats. Since parcels are much larger and are fewer in number than either letters or flats, their processing tends to involve less automation. Nonetheless, a significant portion of parcels undergo automatic imaging and machine recognition as they are processed, particularly those shipped between individuals. While the description herein is specifically directed to processing of letters, the methods apply to flats and parcels as well.
- An image of the mailpiece is captured 225 , which can include just any labeling on the mailpiece or can include imaging multiple sides of the mailpiece. Any stamps or other postage indicia can be cancelled 230 , and the destination address can be read 235 , for example by performing an optical character recognition (OCR) process on the mailpiece images, and/or other machine-recognition processes as described herein. In some cases, as described below, the return/sender address can also be read and stored.
- OCR optical character recognition
- a single automated system can perform processes 220 through 235 in this example.
- a facer-canceller system as used herein can include high-resolution color imaging, along with sophisticated automatic recognition that checks for authentic stamps, and is capable of recognizing address information, barcodes, logos, and the graphical layout of the item, such that the specific item can be recognized and correlated in subsequent processing.
- the mail items are routed to subsequent automated processing systems, such as primary sortation 240 , which sorts the mailpieces to their general geographic delivery area, and secondary sortation 245 , which sorts the mailpieces to a more discrete level, for example to a specific delivery route.
- Advertising mail 250 may be inserted for secondary sortation 245 , having been pre-processed for primary sortation.
- the mailpieces are then transported 255 to a local delivery point for delivery 260 to the individual recipients 265 .
- the process from 220 to 245 typically takes up to 10 hours, including the time from when the mailpieces are received at the ventral processes facility to when they are ready to be transported to local delivery units. This processing time allows for significant offline processing to occur between initial image capture and final sortation, as the mail is being physically prepared for delivery.
- Initial image capture can provide a high resolution image, from which important information is derived, as is required for processing.
- FIG. 3 is an example of a typical mailpiece exchanged between individuals, with the information that is available to determine processing and delivery.
- the stamp or other postage indicia 302 is indication that the cost of the delivery services for the item to which it is affixed has been paid.
- the system analyzes the image of the stamp to authenticate the stamp, and the stamp can be cancelled to prevent reuse.
- the sender address 304 and recipient address 306 are used to determine where the item will be delivered.
- the intended recipient Joe Smith
- the intended recipient Joe Smith
- the item may be returned to the sender, according to the delivery service paid by the stamp.
- Systems and methods as described herein enable authorized security and law enforcement officials (and other parties, as appropriate) to determine the parties with whom a person of interest exchanges mail, records instances of mail exchange between them, establishes networks of those individuals, and intercepts mail items when needed.
- Systems as described herein can screen all mail processed through conventional means for named individuals at a given address. At this point, images associated with mail addressed to those specific, named individuals will be subject to additional processing as described herein.
- FIG. 4 is a flowchart of various processes in accordance with disclosed embodiments that can be performed in addition to the processes of FIG. 2 .
- the processes of FIG. 2 are performed separately than the processes of FIG. 4 , and the processes of FIG. 4 may or may not use data, images, or other information produced in the process of FIG. 2 . While this process is described as performed on a single mailpiece, it will be understood that the process can be applied to multiple mailpieces in order to identify the networks of correspondence.
- the system screens a mailpiece against a target list of senders and/or recipients to be screened to determine a match (step 405 ), for example by comparing machine-recognized data of the mailpiece with the target list.
- the machine-recognized data can include OCR data and/or bar-code recognition (BCR) data of the mailpiece, the OCR data including the addressee address information and/or sender address information, and the BCR data being variously composed of recipient's address information, unique identification, sender's identification, and potentially information regarding the fees paid for the items delivery.
- the target list is maintained by the system, and can be updated as described below.
- Screening mailpieces can occur first at a facer-canceller system, as the mailpiece is being processed as shown in FIG. 2 , in particular using the image and machine-recognized data produced using the processing of FIG. 2 , and those processes can be considered part of this step.
- This step can include comparing addressee address information and/or sender address information to a list of target individuals.
- the addressee address information and/or sender address information can correspond to the mailpiece, and in particular can be determined from an optical-character-recognition process performed on an image of the mailpiece.
- This process can include receiving the mailpiece image and associated machine-recognized data of the mailpiece.
- the system stores the mailpiece images for which the system has determined a match on the list of target individuals (step 410 ).
- “Individuals” can include natural persons, companies, organizations or any other sender/addressee that may be a target of processes described herein, including target addresses with or without an individual sender/addressee listed.
- the stored images can be managed in a secure server, remote from the mail processing machine, or on any other data processing system or server as described herein.
- the target list can store the addresses and other information of target individuals, and addresses and other information for other individuals that are associated with the target individuals.
- a record for one target individual can include other individuals known to send mailpieces to or receive mailpieces from the target individuals.
- the target list can be maintained in any suitable database or other data structure.
- the system can perform a machine-recognition process, on the entirety of the mailpiece image (step 415 ) to produce machine-recognized data, if this process was not already performed when determining the sender/addressee information (for example, if only that information was read at that time). In this way, any other identifying information on the mailpiece is also collected and processed.
- the machine recognition process can include OCR and BCR processes. The results of this machine-recognition process are also stored.
- the system can perform a writer identification (ID) process on the mailpiece image (step 320 ).
- writer identification algorithms develop feature vectors for the author(s) who have written on the surface of the mail item. These feature vectors can be used as the basis for deriving biometric information from handwriting.
- This process produces writer identification data that can be stored as associated with the mailpiece sender (based on the sender-block on the mailpiece), associated with the mailpiece addressee, or both.
- the writer identification data and/or any machine-recognized data can also be compared to data that identifies wanted individuals, such as criminals, suspected terrorists, and others. Such a comparison can be used to identify the location of a wanted individual (either as sender or recipient) and can be used to identify other individuals that correspond with the wanted individual, as described herein.
- the system stores the writer identification data, machine-recognized data, and processing data, such as date and time, for future reference (step 425 ), and this data remains associated with the image of the mail item.
- the system can update the target list to reflect the relationship with other individuals identified by the OCR data. For example, if the addressee in the machine-recognized data matches the target list, then the target list can be updated with any machine-recognized data that identifies the sender of the mailpiece, and an indication that this is a known sender to the target individual.
- the target list can be updated with any machine-recognized data that identifies the addressee of the mailpiece, and an indication that this is a known addressee from the target individual.
- the system performs a relationship analysis on the stored data (step 430 ).
- Relationship analysis describes the function of the system whereby networks of correspondence are identified, within which the target individual communicates through the mail, as described in the example below.
- This step can include identifying multiple senders to the same addressee, and any of those senders that correspond with each other, and identifying multiple addressees from the same sender, and whether any of those addressees correspond with each other.
- This step can be performed using the target list to identify other known senders or recipients from the target individual.
- the system can also maintain a “whitelist” of individuals or companies that should not be added to the target list or processed for membership in a network.
- a whitelist could include, for example, bulk mailers or advertisers, political figures, or other individuals that may customarily send mail to a large number of people with whom there is no actual personal relationship.
- “protected” groups could be added to a whitelist, to avoid improper tracking of associations such as church or political organization memberships.
- the system can also set an “interception” flag so that the mailpiece is intercepted (step 435 ). This can include indicating to a mail carrier or other individual that the mailpiece is to be manually intercepted, or can include automatically diverting the mailpiece during automated processing.
- the processing of FIG. 4 can occur between initial image capture of the mail items at the facer-canceller and secondary/sequencing sortation (e.g., at a point between steps 225 and 245 of the process of FIG. 2 ).
- This allows adequate time for thorough offline processing and analysis, with the capability to intercept selected mail items for physical examination.
- Intercepted mail items may be opened and images of the contents of each item may be captured.
- the mail item may or may not be delivered after this point.
- any such interception or inspection of the contents of a mailpiece are performed only with proper legal authority, such as pursuant to a search warrant.
- FIG. 5 illustrates an example of a “network” of correspondence as described herein. For instance, assume individual “A” is the target, and individual “A” communicates with individuals “B”, “C”, and “D”. Individual “B” communicates with “C” and “D”, and individuals “C” and “D” communicate. These communications together represent a simple network 505 . Through analysis of such networks, individuals other than targets are processed against name databases to expand or complete information, such as full names and potential aliases.
- Each of the additional individuals identified as associated with the target individual can also be added as “targets” on the target list as part of the update described above, so that their mail is analyzed by the system in further mail processing.
- the system would identify “B” and “C” as other individuals with whom “A” communicates (as either an addressee or sender).
- the system can then identify that “B” and “C” also communicate with each other, and so define a network of mail communications between “A”, “B”, and “C”.
- such an identified network can include any number of individuals.
- R”, “S”, and “T” may also be identified as a network of correspondence 510 , and because “D” communicates with “R” and “C” communicates with “S”, the system can indicate that that networks 505 and 510 may be related networks, may be part of the same overall network, or may be communication “cells” in a larger organization.
- machine usable/readable or computer usable/readable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).
- ROMs read only memories
- EEPROMs electrically programmable read only memories
- user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).
- computer readable mediums can include transitory and non-transitory mediums, unless otherwise limited in the claims appended hereto.
- Various embodiments can include non-transitory computer readable medium having program instructions tangibly stored thereon executable by one or more processors to perform processes as described herein, and non-transitory computer-readable mediums encoded with executable instructions that, when executed, cause one or more data processing systems to together perform processes as described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This application claims the benefit of the filing date of U.S. Provisional Patent Application 61/376,796, filed Aug. 25, 2010, which is hereby incorporated by reference.
- The present disclosure is directed, in general, to tracking mailpieces.
- Current mail tracking techniques generally allow only updates of location and status of a mailpiece as it is transported and delivered to a recipient. Effective tracking of mail pieces is desirable.
- Various disclosed embodiments include systems, methods, and computer readable mediums for mail analysis. A method includes receiving an image of a first mailpiece and associated machine-recognized data. The method includes comparing the machine-recognized data with a target list to determine a match with a target individual. The method includes performing a writer identification process on the image of the first mailpiece when a match is determined between the machine-recognized data and the target individual. The writer identification process produces writer identification data associated with the first mailpiece. The method includes storing the image of the first mailpiece and associated machine-recognized data and writer identification data.
- The foregoing has outlined rather broadly the features and technical advantages of the present disclosure so that those skilled in the art may better understand the detailed description that follows. Additional features and advantages of the disclosure will be described hereinafter that form the subject of the claims. Those skilled in the art will appreciate that they may readily use the conception and the specific embodiment disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. Those skilled in the art will also realize that such equivalent constructions do not depart from the spirit and scope of the disclosure in its broadest form.
- Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words or phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, whether such a device is implemented in hardware, firmware, software or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases. While some terms may include a wide variety of embodiments, the appended claims may expressly limit these terms to specific embodiments.
- For a more complete understanding of the present disclosure, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, wherein like numbers designate like objects, and in which:
-
FIG. 1 depicts a block diagram of a data processing system in which an embodiment can be implemented; -
FIG. 2 illustrates a flowchart with a broad range of postal processing for individual mail and advertised mail; -
FIG. 3 is an example of a typical mailpiece exchanged between individuals; -
FIG. 4 is a flowchart of various processes in accordance with disclosed embodiments; and -
FIG. 5 illustrates an example of a “network” of correspondence in accordance with disclosed embodiments. -
FIGS. 1 through 5 , discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with reference to exemplary non-limiting embodiments. - The nature of electronic communication is such that monitoring and tracking of digital communication can be performed by exploiting the characteristics of the data and electronic media. Telephone records, wiretaps, text messaging, and electronic mail are easily tracked, via legal and extralegal means, and information gathered under these circumstances can be made available to investigators. With widespread acknowledgement of the ease with which electronic communication can be monitored, individuals that seek to avoid this monitoring, including criminals and terrorists, are shifting communication to traditional means, such as postal delivery. The advantage of postal delivery is the perceived lack of tracking between sender and recipient, the difficulty in monitoring the communication itself, and the possibility to utterly destroy evidence of the communication.
- Disclosed embodiments enable the tracking and monitoring of postal and private-carrier communications to the same degree as electronic communications. Various embodiments include a system by which postal messaging may be tracked, monitored, analyzed and redirected. Some embodiments include systems and methods for tracking the exchange of postal items between a target recipient and various senders, identifying relationship networks between senders and other sender/recipients of other deliveries, recording images of mail items under scrutiny, and potentially intercepting specific mail items prior to delivery. Note that while terms such as “postal”, “mail”, “mail items”, “mailpiece”, and other similar terms are used to describe specific embodiments, these are intended to include private-courier services, letters, and packages as well as governmental (or quasi-governmental) postal services such as the United States Postal Service.
-
FIG. 1 depicts a block diagram of adata processing system 100 in which an embodiment can be implemented, for example as a mail piece tracking and analysis system configured to perform processes as described herein. Thedata processing system 100 includes aprocessor 102 connected to a level two cache/bridge 104, which is connected in turn to alocal system bus 106. Thelocal system bus 106 may be, for example, a peripheral component interconnect (PCI) architecture bus. Also connected to thelocal system bus 106 in the depicted example are amain memory 108 and agraphics adapter 110. Thegraphics adapter 110 may be connected to adisplay 111. - Other peripherals, such as a local area network (LAN)/Wide Area Network/Wireless (e.g. WiFi)
adapter 112, may also be connected to thelocal system bus 106. Anexpansion bus interface 114 connects thelocal system bus 106 to an input/output (I/O)bus 116. The I/O bus 116 is connected to a keyboard/mouse adapter 118, adisk controller 120, and an I/O adapter 122. Thedisk controller 120 can be connected to astorage 126, which can be any suitable machine usable or machine readable storage medium, including but not limited to nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), magnetic tape storage, and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and other known optical, electrical, or magnetic storage devices. - In particular embodiments, the I/
O adapter 122 can be connected tomail handling equipment 128, for processing mailpieces as described below. Mail handling equipment can include sorters, transporters, imagers, printers, and other facing, cancelling, imaging, and processing equipment known to those of skill in the art. - Also connected to the I/
O bus 116 in the example shown is anaudio adapter 124, to which speakers (not shown) may be connected for playing sounds. The keyboard/mouse adapter 118 provides a connection for a pointing device (not shown), such as a mouse, trackball, trackpointer, etc. - Those of ordinary skill in the art will appreciate that the hardware depicted in
FIG. 1 may vary for particular implementations. For example, other peripheral devices, such as an optical disk drive and the like, also may be used in addition or in place of the hardware depicted. In some embodiments, multiple data processing systems may be connected and configured to cooperatively perform the processing described herein. The depicted example is provided for the purpose of explanation only and is not meant to imply architectural limitations with respect to the present disclosure. - A data processing system in accordance with an embodiment of the present disclosure includes an operating system employing a graphical user interface. The operating system permits multiple display windows to be presented in the graphical user interface simultaneously, with each display window providing an interface to a different application or to a different instance of the same application. A cursor in the graphical user interface may be manipulated by a user through the pointing device. The position of the cursor may be changed and/or an event, such as clicking a mouse button, generated to actuate a desired response.
- One of various commercial operating systems, such as a version of Microsoft Windows™, a product of Microsoft Corporation located in Redmond, Wash. may be employed if suitably modified. The operating system is modified or created in accordance with the present disclosure as described.
- The LAN/WAN/
Wireless adapter 112 can be connected to a network 130 (not a part of data processing system 100), which can be any public or private data processing system network or combination of networks, as known to those of skill in the art, including the Internet. Thedata processing system 100 can communicate over thenetwork 130 with aserver system 140, which is also not part of thedata processing system 100, but can be implemented, for example, as a separatedata processing system 100. - Postal operational systems for processing and delivering mail allow for different levels of processing depending on the sender and the quantity and manner in which the mail is prepared.
- Advertising mail, which is typically many duplicate mail items, presorted according to neighborhoods and delivery stops, bypasses most processing, distribution, and even transportation steps. On the other hand, mail between individuals tends to be individual in content, and requires the broadest range of postal processing. Disclosed embodiments are particularly useful with regard to mail between individuals, which tends to represent specific communication between individuals.
-
FIG. 2 illustrates aflowchart 200 with a broad range of postal processing for individual mail and advertised mil. Generally, mail between individuals requires all postal processing steps. - An
individual sender 205 places a mailpiece forcollection 210, for example in a home mail box, central mail box, or post office. - The mailpiece is transported 215 to a processing facility, where is it separated by
format 220. This can include, for example, separating letters from flats or parcels. Postal processing systems tend to be specialized according to the size and shape of the mail item. The smallest mail items are flat, letter-sized items, called “letters,” which are efficiently processed in highly automated systems, with extensive automatic imaging and related automatic machine-recognition capabilities. The next class of mail is called “flats;” they are flat items that tend to be the size of a magazine. Flats processing is not quite as automated as letters, but they also undergo extensive automatic imaging and machine recognition coincident with their processing. The final principal class of items is called “parcels,” which represent items that tend to not be “flat” in their shape, and tend to represent physical goods rather than printed information, as is the case with letters and flats. Since parcels are much larger and are fewer in number than either letters or flats, their processing tends to involve less automation. Nonetheless, a significant portion of parcels undergo automatic imaging and machine recognition as they are processed, particularly those shipped between individuals. While the description herein is specifically directed to processing of letters, the methods apply to flats and parcels as well. - An image of the mailpiece is captured 225, which can include just any labeling on the mailpiece or can include imaging multiple sides of the mailpiece. Any stamps or other postage indicia can be cancelled 230, and the destination address can be read 235, for example by performing an optical character recognition (OCR) process on the mailpiece images, and/or other machine-recognition processes as described herein. In some cases, as described below, the return/sender address can also be read and stored.
- In some implementations, a single automated system called a “facer-canceller,” can perform
processes 220 through 235 in this example. A facer-canceller system as used herein can include high-resolution color imaging, along with sophisticated automatic recognition that checks for authentic stamps, and is capable of recognizing address information, barcodes, logos, and the graphical layout of the item, such that the specific item can be recognized and correlated in subsequent processing. After the facer canceller, the mail items are routed to subsequent automated processing systems, such asprimary sortation 240, which sorts the mailpieces to their general geographic delivery area, andsecondary sortation 245, which sorts the mailpieces to a more discrete level, for example to a specific delivery route.Advertising mail 250 may be inserted forsecondary sortation 245, having been pre-processed for primary sortation. - The mailpieces are then transported 255 to a local delivery point for
delivery 260 to theindividual recipients 265. - The process from 220 to 245 typically takes up to 10 hours, including the time from when the mailpieces are received at the ventral processes facility to when they are ready to be transported to local delivery units. This processing time allows for significant offline processing to occur between initial image capture and final sortation, as the mail is being physically prepared for delivery.
- Initial image capture can provide a high resolution image, from which important information is derived, as is required for processing.
-
FIG. 3 is an example of a typical mailpiece exchanged between individuals, with the information that is available to determine processing and delivery. The stamp orother postage indicia 302 is indication that the cost of the delivery services for the item to which it is affixed has been paid. The system analyzes the image of the stamp to authenticate the stamp, and the stamp can be cancelled to prevent reuse. - The
sender address 304 andrecipient address 306, as well as the mail class indicated by theindicia 302, are used to determine where the item will be delivered. - For example, if the intended recipient, Joe Smith, has filed a change of address form, mail addressed to him at 15A Serenity Drive will be forwarded to the address specified in the change of address form. In another example, if the item cannot be delivered, the item may be returned to the sender, according to the delivery service paid by the stamp.
- The data available for use in traditional postal processing forms the basis for important security-related applications as well, as described herein. Systems and methods as described herein enable authorized security and law enforcement officials (and other parties, as appropriate) to determine the parties with whom a person of interest exchanges mail, records instances of mail exchange between them, establishes networks of those individuals, and intercepts mail items when needed.
- Systems as described herein can screen all mail processed through conventional means for named individuals at a given address. At this point, images associated with mail addressed to those specific, named individuals will be subject to additional processing as described herein.
-
FIG. 4 is a flowchart of various processes in accordance with disclosed embodiments that can be performed in addition to the processes ofFIG. 2 . In various embodiments, the processes ofFIG. 2 are performed separately than the processes ofFIG. 4 , and the processes ofFIG. 4 may or may not use data, images, or other information produced in the process ofFIG. 2 . While this process is described as performed on a single mailpiece, it will be understood that the process can be applied to multiple mailpieces in order to identify the networks of correspondence. - The system screens a mailpiece against a target list of senders and/or recipients to be screened to determine a match (step 405), for example by comparing machine-recognized data of the mailpiece with the target list. The machine-recognized data can include OCR data and/or bar-code recognition (BCR) data of the mailpiece, the OCR data including the addressee address information and/or sender address information, and the BCR data being variously composed of recipient's address information, unique identification, sender's identification, and potentially information regarding the fees paid for the items delivery.
- The target list is maintained by the system, and can be updated as described below. Screening mailpieces can occur first at a facer-canceller system, as the mailpiece is being processed as shown in
FIG. 2 , in particular using the image and machine-recognized data produced using the processing ofFIG. 2 , and those processes can be considered part of this step. This step can include comparing addressee address information and/or sender address information to a list of target individuals. The addressee address information and/or sender address information can correspond to the mailpiece, and in particular can be determined from an optical-character-recognition process performed on an image of the mailpiece. This process can include receiving the mailpiece image and associated machine-recognized data of the mailpiece. - The system stores the mailpiece images for which the system has determined a match on the list of target individuals (step 410). “Individuals” can include natural persons, companies, organizations or any other sender/addressee that may be a target of processes described herein, including target addresses with or without an individual sender/addressee listed. The stored images can be managed in a secure server, remote from the mail processing machine, or on any other data processing system or server as described herein.
- In various embodiments, the target list can store the addresses and other information of target individuals, and addresses and other information for other individuals that are associated with the target individuals. For example, a record for one target individual can include other individuals known to send mailpieces to or receive mailpieces from the target individuals. Further, while the term “list” is used herein, the target list can be maintained in any suitable database or other data structure.
- Once stored, the system can perform a machine-recognition process, on the entirety of the mailpiece image (step 415) to produce machine-recognized data, if this process was not already performed when determining the sender/addressee information (for example, if only that information was read at that time). In this way, any other identifying information on the mailpiece is also collected and processed. The machine recognition process can include OCR and BCR processes. The results of this machine-recognition process are also stored.
- The system can perform a writer identification (ID) process on the mailpiece image (step 320). According to various embodiments, writer identification algorithms develop feature vectors for the author(s) who have written on the surface of the mail item. These feature vectors can be used as the basis for deriving biometric information from handwriting. This process produces writer identification data that can be stored as associated with the mailpiece sender (based on the sender-block on the mailpiece), associated with the mailpiece addressee, or both.
- In some cases, the writer identification data and/or any machine-recognized data can also be compared to data that identifies wanted individuals, such as criminals, suspected terrorists, and others. Such a comparison can be used to identify the location of a wanted individual (either as sender or recipient) and can be used to identify other individuals that correspond with the wanted individual, as described herein.
- The system stores the writer identification data, machine-recognized data, and processing data, such as date and time, for future reference (step 425), and this data remains associated with the image of the mail item. As part of this step, the system can update the target list to reflect the relationship with other individuals identified by the OCR data. For example, if the addressee in the machine-recognized data matches the target list, then the target list can be updated with any machine-recognized data that identifies the sender of the mailpiece, and an indication that this is a known sender to the target individual. Similarly, if the sender in the machine-recognized data matches the target list, then the target list can be updated with any machine-recognized data that identifies the addressee of the mailpiece, and an indication that this is a known addressee from the target individual.
- The system performs a relationship analysis on the stored data (step 430). Relationship analysis describes the function of the system whereby networks of correspondence are identified, within which the target individual communicates through the mail, as described in the example below. This step can include identifying multiple senders to the same addressee, and any of those senders that correspond with each other, and identifying multiple addressees from the same sender, and whether any of those addressees correspond with each other. This step can be performed using the target list to identify other known senders or recipients from the target individual.
- In various embodiments, the system can also maintain a “whitelist” of individuals or companies that should not be added to the target list or processed for membership in a network. Such a whitelist could include, for example, bulk mailers or advertisers, political figures, or other individuals that may customarily send mail to a large number of people with whom there is no actual personal relationship. Similarly, “protected” groups could be added to a whitelist, to avoid improper tracking of associations such as church or political organization memberships.
- The system can also set an “interception” flag so that the mailpiece is intercepted (step 435). This can include indicating to a mail carrier or other individual that the mailpiece is to be manually intercepted, or can include automatically diverting the mailpiece during automated processing.
- In some embodiments, the processing of
FIG. 4 can occur between initial image capture of the mail items at the facer-canceller and secondary/sequencing sortation (e.g., at a point betweensteps FIG. 2 ). This allows adequate time for thorough offline processing and analysis, with the capability to intercept selected mail items for physical examination. Intercepted mail items may be opened and images of the contents of each item may be captured. The mail item may or may not be delivered after this point. Preferably, any such interception or inspection of the contents of a mailpiece are performed only with proper legal authority, such as pursuant to a search warrant. -
FIG. 5 illustrates an example of a “network” of correspondence as described herein. For instance, assume individual “A” is the target, and individual “A” communicates with individuals “B”, “C”, and “D”. Individual “B” communicates with “C” and “D”, and individuals “C” and “D” communicate. These communications together represent asimple network 505. Through analysis of such networks, individuals other than targets are processed against name databases to expand or complete information, such as full names and potential aliases. - Each of the additional individuals identified as associated with the target individual can also be added as “targets” on the target list as part of the update described above, so that their mail is analyzed by the system in further mail processing. In the example above, if “A” is the initial target, the system would identify “B” and “C” as other individuals with whom “A” communicates (as either an addressee or sender). By processing “B” and “C” as targets, the system can then identify that “B” and “C” also communicate with each other, and so define a network of mail communications between “A”, “B”, and “C”. Of course, in various implementations, such an identified network can include any number of individuals.
- Note, in this example, that “R”, “S”, and “T” may also be identified as a network of
correspondence 510, and because “D” communicates with “R” and “C” communicates with “S”, the system can indicate that that networks 505 and 510 may be related networks, may be part of the same overall network, or may be communication “cells” in a larger organization. - Those skilled in the art will recognize that, for simplicity and clarity, the full structure and operation of all systems suitable for use with the present disclosure is not being depicted or described herein. Instead, only so much of the physical systems as is unique to the present disclosure or necessary for an understanding of the present disclosure is depicted and described. The remainder of the construction and operation of the systems disclosed herein may conform to any of the various current implementations and practices known in the art.
- It is important to note that while the disclosure includes a description in the context of a fully functional system, those skilled in the art will appreciate that at least portions of the mechanism of the present disclosure are capable of being distributed in the form of a instructions contained within a machine-usable, computer-usable, or computer-readable medium in any of a variety of forms, and that the present disclosure applies equally regardless of the particular type of instruction or signal bearing medium or storage medium utilized to actually carry out the distribution. Examples of machine usable/readable or computer usable/readable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs). In particular, computer readable mediums can include transitory and non-transitory mediums, unless otherwise limited in the claims appended hereto. Various embodiments can include non-transitory computer readable medium having program instructions tangibly stored thereon executable by one or more processors to perform processes as described herein, and non-transitory computer-readable mediums encoded with executable instructions that, when executed, cause one or more data processing systems to together perform processes as described herein.
- Although an exemplary embodiment of the present disclosure has been described in detail, those skilled in the art will understand that various changes, substitutions, variations, and improvements disclosed herein may be made without departing from the spirit and scope of the disclosure in its broadest form.
- None of the description in the present application should be read as implying that any particular element, step, or function is an essential element which must be included in the claim scope: the scope of patented subject matter is defined only by the allowed claims. Moreover, none of these claims are intended to invoke paragraph six of 35 USC §112 unless the exact words “means for” are followed by a participle.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/185,733 US9002051B2 (en) | 2010-08-25 | 2011-07-19 | Mail exchange tracking and analysis |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37679610P | 2010-08-25 | 2010-08-25 | |
US13/185,733 US9002051B2 (en) | 2010-08-25 | 2011-07-19 | Mail exchange tracking and analysis |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120051587A1 true US20120051587A1 (en) | 2012-03-01 |
US9002051B2 US9002051B2 (en) | 2015-04-07 |
Family
ID=45697323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/185,733 Expired - Fee Related US9002051B2 (en) | 2010-08-25 | 2011-07-19 | Mail exchange tracking and analysis |
Country Status (1)
Country | Link |
---|---|
US (1) | US9002051B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9221079B1 (en) * | 2011-08-02 | 2015-12-29 | National Presort, Inc. | System and method for real-time address correction |
US10181110B1 (en) * | 2012-12-05 | 2019-01-15 | Stamps.Com Inc. | Systems and methods for mail piece interception, rescue tracking, and confiscation alerts and related services |
DE102017217242A1 (en) | 2017-09-27 | 2019-03-28 | Deutsche Post Ag | Method and system for identifying consignment units |
US11017347B1 (en) * | 2020-07-09 | 2021-05-25 | Fourkites, Inc. | Supply chain visibility platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6535619B1 (en) * | 1998-01-22 | 2003-03-18 | Fujitsu Limited | Address recognition apparatus and method |
US20080192978A1 (en) * | 2002-10-30 | 2008-08-14 | Lockheed Martin Corporation | Mail image profiling and handwriting matching |
US20090034803A1 (en) * | 2007-06-11 | 2009-02-05 | Matos Jeffrey A | Apparatus and method for verifying the identity of an author |
-
2011
- 2011-07-19 US US13/185,733 patent/US9002051B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6535619B1 (en) * | 1998-01-22 | 2003-03-18 | Fujitsu Limited | Address recognition apparatus and method |
US20080192978A1 (en) * | 2002-10-30 | 2008-08-14 | Lockheed Martin Corporation | Mail image profiling and handwriting matching |
US20090034803A1 (en) * | 2007-06-11 | 2009-02-05 | Matos Jeffrey A | Apparatus and method for verifying the identity of an author |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9221079B1 (en) * | 2011-08-02 | 2015-12-29 | National Presort, Inc. | System and method for real-time address correction |
US9697408B2 (en) | 2011-08-02 | 2017-07-04 | National Presort, Inc. | System and method for real-time address correction |
US10181110B1 (en) * | 2012-12-05 | 2019-01-15 | Stamps.Com Inc. | Systems and methods for mail piece interception, rescue tracking, and confiscation alerts and related services |
US10600019B1 (en) * | 2012-12-05 | 2020-03-24 | Stamps.Com Inc. | Systems and methods for mail piece interception, rescue tracking, and confiscation alerts and related services |
DE102017217242A1 (en) | 2017-09-27 | 2019-03-28 | Deutsche Post Ag | Method and system for identifying consignment units |
EP3462380A2 (en) | 2017-09-27 | 2019-04-03 | Deutsche Post AG | Method and system for marking shipping units |
DE102017217242B4 (en) | 2017-09-27 | 2024-03-28 | Deutsche Post Ag | Method and system for marking shipment units |
US11017347B1 (en) * | 2020-07-09 | 2021-05-25 | Fourkites, Inc. | Supply chain visibility platform |
US11195139B1 (en) * | 2020-07-09 | 2021-12-07 | Fourkites, Inc. | Supply chain visibility platform |
US20220129844A1 (en) * | 2020-07-09 | 2022-04-28 | Fourkites, Inc. | Supply chain visibility platform |
US11748693B2 (en) * | 2020-07-09 | 2023-09-05 | Fourkites, Inc. | Supply chain visibility platform |
Also Published As
Publication number | Publication date |
---|---|
US9002051B2 (en) | 2015-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10956866B2 (en) | Method and system for providing electronic customs form | |
US7301115B2 (en) | System and method of identifying and sorting response services mail pieces in accordance with plural levels of refinement in order to enhance postal service revenue protection | |
US20060031086A1 (en) | System and method for providing a virtual mailbox | |
JP2010538384A (en) | Method for processing mail pieces using client code associated with digital imprint | |
US8867783B2 (en) | Electronic lockbox transaction processing | |
US9002051B2 (en) | Mail exchange tracking and analysis | |
US20240212088A1 (en) | System and method for authenticated mail | |
US9639821B2 (en) | Integrated physical and electronic mail delivery | |
US20240249544A1 (en) | System and method for automatically recognizing delivery point information | |
US20090287742A1 (en) | Method and system for run time directories for address services on a mail processing system | |
US20120182588A1 (en) | Distributed image acquisition for postal processing | |
US8265788B2 (en) | Sorting mail in carrier walk sequence | |
US20040094615A1 (en) | Recipient elected messaging services enabled by processing codes printed on mail | |
JP4738234B2 (en) | Conveyance system | |
US8818023B2 (en) | Bulk region of interest learning | |
US20050075987A1 (en) | Method for capturing and processing information in a communication system | |
US7991705B2 (en) | Mail processing system for determining mail entity defects and correcting mail entity defects | |
US9836704B2 (en) | Postal seamless acceptance system for determining exception handling | |
US8655013B2 (en) | Virtual remote encoding system | |
KR101384409B1 (en) | A method and a system for collecting and filing of information on non-delivered mail | |
US6993491B2 (en) | Method for a carrier to determine the location of a missing person | |
US7365284B2 (en) | Sorting mail in carrier walk sequence | |
US9221079B1 (en) | System and method for real-time address correction | |
US20220012674A1 (en) | Voice based proof of delivery for packages | |
US20140085684A1 (en) | Inclusive Postal Service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SIEMENS INDUSTRY, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CARPENTER, MICHAEL D.;REEL/FRAME:026613/0314 Effective date: 20110713 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: SIEMENS POSTAL, PARCEL & AIRPORT LOGISTICS LLC, TE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIEMENS INDUSTRY, INC.;REEL/FRAME:049081/0626 Effective date: 20190430 |
|
AS | Assignment |
Owner name: SIEMENS LOGISTICS LLC, UNITED STATES Free format text: CHANGE OF NAME;ASSIGNOR:SIEMENS POSTAL, PARCEL & AIRPORT LOGISTICS LLC;REEL/FRAME:051588/0282 Effective date: 20190516 |
|
AS | Assignment |
Owner name: KOERBER SUPPLY CHAIN LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIEMENS LOGISTICS LLC;REEL/FRAME:061509/0808 Effective date: 20220830 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230407 |